A Guide to Virtual Private Networks

Overview

For the privacy you need at a cost you can afford, Virtual Private Networks use a constellation of technologies to create secure "tunnels" over regular Internet lines. This comprehensive guide explains everything you need to plan, build, and configure a VPN for your organization.
Read More Show Less
... See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (12) from $1.99   
  • New (5) from $7.93   
  • Used (7) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$7.93
Seller since 2009

Feedback rating:

(45)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
BRAND NEW BOOK. 100% satisfaction is guaranteed!

Ships from: POINT ROBERTS, WA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$19.95
Seller since 2006

Feedback rating:

(427)

Condition: New
New Excellent Condition! No Remainder Mark, No Damage, 100% satisfaction guaranteed. Ship twice daily.

Ships from: Plano, TX

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$32.27
Seller since 2014

Feedback rating:

(0)

Condition: New
0130839647 New Book. Please allow 4-14 business days to arrive. We will ship Internationally as well. Very Good Customer Service is Guaranteed!! Millions sold offline.

Ships from: Newport, United Kingdom

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$50.00
Seller since 2014

Feedback rating:

(113)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$150.47
Seller since 2014

Feedback rating:

(226)

Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

For the privacy you need at a cost you can afford, Virtual Private Networks use a constellation of technologies to create secure "tunnels" over regular Internet lines. This comprehensive guide explains everything you need to plan, build, and configure a VPN for your organization.
Read More Show Less

Editorial Reviews

Booknews
Describes how to implement virtual private networks (VPNs) based on authentication, encryption, and the exchange of security keys, as stated in the IP Security Architecture (IPSec) standard and draft documents. Scenarios explain how to set up IP tunneling via existing IP networks and the Internet to implement secure and private conversations over public networks, illustrating point-to-point, branch office, and remote user environments. An outlook is provided on further development in this area, including certificate and key management frameworks such as Internet Key Exchange. Annotation c. by Book News, Inc., Portland, Or.
Read More Show Less

Product Details

  • ISBN-13: 9780130839640
  • Publisher: Prentice Hall, Inc.
  • Publication date: 2/2/1999
  • Series: Networking Series
  • Edition number: 1
  • Pages: 174
  • Product dimensions: 7.04 (w) x 9.23 (h) x 0.58 (d)

Table of Contents

Figures
Tables
Preface
The Authors
Ch. 1 Virtual Private Networks (VPN) Overview 1
Ch. 2 A Short Introduction to Cryptography 27
Ch. 3 Description of IPSec 47
Ch. 4 The Internet Key Exchange (IKE) Protocol 71
Ch. 5 Branch Office Connection Scenario 89
Ch. 6 Business Partner/Supplier Network Scenario 103
Ch. 7 Remote Access Scenario 111
App. A IBM eNetwork VPN Solutions 119
App. B Troubleshooting Your VPN 141
App. C Special Notices 153
App. D Related Publications 157
List of Abbreviations 159
Index 163
Read More Show Less

Introduction

PREFACE
This book describes how to implement virtual private networks (VPNs) based on authentication, encryption, and the exchange of security keys, as defined in the IP Security Architecture (IPSec) standard and draft documents.

This book will help readers to identify the benefits of VPNs and then to successfully deploy VPNs. The most commonly used encryption algorithms and handshaking protocols are explained as a general introduction to IP security.

Scenarios describe how to set up IP tunnelling via existing IP networks and the Internet to effectively implement secure and private conversations over public networks. The scenarios illustrate point-to-point (client-to-server, server-to-server or client-to-client), branch office (LAN-LAN) and remote user (client-LAN) environments.

An outlook is provided on further development in this area, including certificate and key management frameworks such as Internet Key Exchange (IKE), formerly referred to as ISAKMP/Oakley.

This book essentially presents a subset of the information contained in the IBM Redbook: A Comprehensive Guide to Virtual Private Networks, Volume I: IBM Firewall, Server and Client Solutions, June 1998, IBM publication number SG24-5201, but also contains updated information according to the latest IPSec standards.

THE AUTHORS
This publication was produced by a team of specialists from around the world working at the International Technical Support Organization Raleigh Center. The leader of this project was Martin W. Murhammer.

MARTIN W. MURHAMMER is a Senior I/T Availability Professional at the International Technical SupportOrganization Raleigh Center. Before joining the ITSO in 1996, he was a Systems Engineer in the Systems Service Center at IBM Austria. He has 13 years of experience in the personal computing environment including such areas as heterogeneous connectivity, server design, system recovery, and Internet solutions. He is a Certified OS/2 Engineer and a Certified LAN Server Engineer and has previously coauthored six redbooks during residencies at the ITSO Raleigh and Austin Centers.

TIM A. BOURNE is an Advisory Software Engineer at the IBM PC Company. He has 10 years of experience in software design and development including implementation of Internet protocols, air traffic control and embedded communication systems.

TAMAS GAIDOSCH is an I/T Architect in IBM Hungary. He specializes in networking software and e-business solutions in the banking industry. Tamas has five years of experience in networked computing environments and systems administration. He holds a Master's degree in Computer Science. His areas of expertise include operating systems (OS/2 LAN Server, Windows NT, AIX), networks (TCP/IP, X.25) and self-service banking software.

CHARLES KUNZINGER is a Senior Engineer in Research Triangle Park, with responsibility for the technical integrity of IBM's Virtual Private Network line of products. He has worked for IBM since 1967 in various development, advanced technology, and architecture groups. For the last ten years, he has had extensive experience in the development of network layer open standards, and has represented IBM in various open standards bodies, covering such areas as interdomain routing, mobile-IP, and wireless communications, and has contributed to the development of open security standards in each of these fields.

LAURA RADEMACHER is a member of the VPN Brand Management group located in Research Triangle Park, NC, and has spent much of her marketing career on the promotion of VPN technology and solutions. Prior to joining the marketing organization, she was in the TCP/IP technology area, focusing her time mainly on the education and advancement of Internet security. Laura has 15 years of experience with IBM.

ANDREAS WEINFURTER is an Advisory I/T Availability Professional at the IBM System Services Center in Salzburg, Austria. After joining IBM in 1988 he worked as an instructor at the IBM education center in Vienna, where he was responsible for the PC curriculum and held mainly classes on OS/2 and networking. His primary areas of work for the past six years have been AIX and TCP/IP with a strong focus on firewalls during the last two years. Andreas holds a Master's degree in Computer Science from the Vienna University of Technology.

Thanks to the following people for their invaluable contributions to this project:

Tim Kearby, Karl Wozabal, Jorge Ferrari, Margaret Ticknor Shawn Walsh, Kathryn Casamento, Linda Robinson
International Technical Support Organization Raleigh Center

Bob Tunstall, Vach Kompella, Jaime Claypool, Steven Lingafelt Linwood Overby, Cindy Stone-Rutherford
IBM Research Triangle Park

Jackie Wilson, Chris Wenzel, Shay Hoffmaster
IBM Austin

Richard Planutis
IBM Endicott
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)